From 7068c84c6ac8020c30c65678f64799b74adf0750 Mon Sep 17 00:00:00 2001 From: Matthias Grundmann Date: Fri, 8 Jun 2018 15:43:53 +0200 Subject: [PATCH] Fix parameter in url and some spelling --- .../src/main/resources/i18n/WebGoatLabels.properties | 2 +- .../lessonPlans/en/CrossSiteScripting_content5b.adoc | 4 ++-- .../lessonPlans/en/CrossSiteScripting_content6a.adoc | 4 ++-- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/webgoat-lessons/cross-site-scripting/src/main/resources/i18n/WebGoatLabels.properties b/webgoat-lessons/cross-site-scripting/src/main/resources/i18n/WebGoatLabels.properties index 3f6a96ee21..880258b1d3 100644 --- a/webgoat-lessons/cross-site-scripting/src/main/resources/i18n/WebGoatLabels.properties +++ b/webgoat-lessons/cross-site-scripting/src/main/resources/i18n/WebGoatLabels.properties @@ -5,7 +5,7 @@ xss-reflected-5a-failure=Try again. We do want to see this specific javascript ( xss-reflected-5b-success=Correct ... because xss-reflected-5b-failure=Nope, pretty easy to guess now though. xss-reflected-6a-success=Correct! Now, see if you can send in an exploit to that route in the next assignment. -xss-reflected-6a-failure=No, look at the example. Check the GoatRouter.js file. It should be pretty easy to determine. +xss-reflected-6a-failure=No, look at the example. Check the GoatRouter.js file. It should be pretty easy to determine. xss.lesson1.failure=Are you sure? Try using a tab from a different site. xss-dom-message-success=Correct, I hope you didn't cheat, using the console! xss-dom-message-failure=Incorrect, keep trying. It should be obvious in the log when you are successful. diff --git a/webgoat-lessons/cross-site-scripting/src/main/resources/lessonPlans/en/CrossSiteScripting_content5b.adoc b/webgoat-lessons/cross-site-scripting/src/main/resources/lessonPlans/en/CrossSiteScripting_content5b.adoc index e0cf6f9499..850f0d09e9 100644 --- a/webgoat-lessons/cross-site-scripting/src/main/resources/lessonPlans/en/CrossSiteScripting_content5b.adoc +++ b/webgoat-lessons/cross-site-scripting/src/main/resources/lessonPlans/en/CrossSiteScripting_content5b.adoc @@ -4,7 +4,7 @@ You should have been able to execute script with the last example. At this point Why is that? -That is because there is no link that would tigger that XSS. +That is because there is no link that would trigger that XSS. You can try it yourself to see what happens ... go to (substitute localhost with your server's name or IP if you need to): -link: http://localhost:8080/WebGoat/CrossSiteScripting/attack5a?QTY1=1&QTY2=1&QTY3=1&QTY4=1&field1=4128+3214+0002+1999&field2=111 +link: http://localhost:8080/WebGoat/CrossSiteScripting/attack5a?QTY1=1&QTY2=1&QTY3=1&QTY4=1&field1=4128+3214+0002+1999&field2=111 diff --git a/webgoat-lessons/cross-site-scripting/src/main/resources/lessonPlans/en/CrossSiteScripting_content6a.adoc b/webgoat-lessons/cross-site-scripting/src/main/resources/lessonPlans/en/CrossSiteScripting_content6a.adoc index 656d9f4dea..cd815fce0e 100644 --- a/webgoat-lessons/cross-site-scripting/src/main/resources/lessonPlans/en/CrossSiteScripting_content6a.adoc +++ b/webgoat-lessons/cross-site-scripting/src/main/resources/lessonPlans/en/CrossSiteScripting_content6a.adoc @@ -1,4 +1,4 @@ -== Ientify Potential for DOM-Based XSS +== Identify Potential for DOM-Based XSS DOM-Based XSS can usually be found by looking for the route configurations in the client-side code. Look for a route that takes inputs that you can ID being 'reflected' to the page. @@ -7,7 +7,7 @@ For this example, you'll want to look for some 'test' code in the route handlers Sometimes, test code gets left in production (and often times test code is very simple and lacks security or any quality controls!). Your objective is to find the route and exploit it. First though ... what is the base route? As an example, look at the URL for this lesson ... -it should look something like /WebGoat/start.mvc#lesson/CrossSiteScripting.lesson/5 (although maybe slightly different). The 'base route' in this case is: +it should look something like /WebGoat/start.mvc#lesson/CrossSiteScripting.lesson/9 (although maybe slightly different). The 'base route' in this case is: *start.mvc#lesson/* The *CrossSiteScripting.lesson/#* after that are parameters that are processed by javascript route handler.